diff options
Diffstat (limited to 'source3')
-rw-r--r-- | source3/Makefile.in | 12 | ||||
-rw-r--r-- | source3/configure.in | 24 | ||||
-rw-r--r-- | source3/modules/nfs4_acls.c | 668 | ||||
-rw-r--r-- | source3/modules/nfs4_acls.h | 146 | ||||
-rw-r--r-- | source3/modules/vfs_aixacl2.c | 537 | ||||
-rw-r--r-- | source3/modules/vfs_gpfsacl.c | 610 | ||||
-rw-r--r-- | source3/smbd/posix_acls.c | 6 |
7 files changed, 3 insertions, 2000 deletions
diff --git a/source3/Makefile.in b/source3/Makefile.in index d8c9a83391..0ff5872063 100644 --- a/source3/Makefile.in +++ b/source3/Makefile.in @@ -381,11 +381,9 @@ VFS_READONLY_OBJ = modules/vfs_readonly.o modules/getdate.o VFS_CAP_OBJ = modules/vfs_cap.o VFS_EXPAND_MSDFS_OBJ = modules/vfs_expand_msdfs.o VFS_SHADOW_COPY_OBJ = modules/vfs_shadow_copy.o -VFS_GPFSACL_OBJ = modules/vfs_gpfsacl.o modules/nfs4_acls.o VFS_AFSACL_OBJ = modules/vfs_afsacl.o VFS_POSIXACL_OBJ = modules/vfs_posixacl.o VFS_AIXACL_OBJ = modules/vfs_aixacl.o modules/vfs_aixacl_util.o -VFS_AIXACL2_OBJ = modules/vfs_aixacl2.o modules/vfs_aixacl_util.o modules/nfs4_acls.o VFS_SOLARISACL_OBJ = modules/vfs_solarisacl.o VFS_HPUXACL_OBJ = modules/vfs_hpuxacl.o VFS_IRIXACL_OBJ = modules/vfs_irixacl.o @@ -1371,11 +1369,6 @@ bin/aixacl.@SHLIBEXT@: $(VFS_AIXACL_OBJ:.o=.@PICSUFFIX@) @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_AIXACL_OBJ:.o=.@PICSUFFIX@) \ @SONAMEFLAG@`basename $@` -bin/aixacl2.@SHLIBEXT@: $(VFS_AIXACL2_OBJ:.o=.@PICSUFFIX@) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_AIXACL2_OBJ:.o=.@PICSUFFIX@) \ - @SONAMEFLAG@`basename $@` - bin/solarisacl.@SHLIBEXT@: $(VFS_SOLARISACL_OBJ:.o=.@PICSUFFIX@) @echo "Building plugin $@" @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_SOLARISACL_OBJ:.o=.@PICSUFFIX@) \ @@ -1396,11 +1389,6 @@ bin/tru64acl.@SHLIBEXT@: $(VFS_TRU64ACL_OBJ:.o=.@PICSUFFIX@) @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_TRU64ACL_OBJ:.o=.@PICSUFFIX@) \ @SONAMEFLAG@`basename $@` -bin/gpfsacl.@SHLIBEXT@: $(VFS_GPFSACL_OBJ:.o=.po) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_GPFSACL_OBJ:.o=.@PICSUFFIX@) \ - @SONAMEFLAG@`basename $@` - bin/catia.@SHLIBEXT@: $(VFS_CATIA_OBJ:.o=.@PICSUFFIX@) @echo "Building plugin $@" @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_CATIA_OBJ:.o=.@PICSUFFIX@) \ diff --git a/source3/configure.in b/source3/configure.in index 304c1264fc..c84312f32a 100644 --- a/source3/configure.in +++ b/source3/configure.in @@ -3076,28 +3076,6 @@ if test x"$samba_cv_WITH_AFS" != x"no" && test x"$have_afs_headers" = x"yes"; th fi ################################################# -# check whether to compile GPFS/NT ACL mapping module -samba_cv_WITH_VFS_GPFSACL=no -AC_MSG_CHECKING(whether to use GPFS acl module) -AC_ARG_WITH(vfs-gpfsacl, -[ --with-vfs-gpfsacl Include GPFS to NT ACL mapping module (default=no) ], -[ case "$withval" in - yes|auto) - AC_MSG_RESULT($withval) - samba_cv_WITH_VFS_GPFSACL=yes - ;; - *) - AC_MSG_RESULT(no) - ;; - esac ], - AC_MSG_RESULT(no) -) - -if test x"$samba_cv_WITH_VFS_GPFSACL" = x"yes"; then - default_shared_modules="$default_shared_modules vfs_gpfsacl" -fi - -################################################# # check for the DFS clear-text auth system AC_MSG_CHECKING(whether to use DFS clear-text auth) AC_ARG_WITH(dfs, @@ -5612,10 +5590,8 @@ SMB_MODULE(vfs_cap, \$(VFS_CAP_OBJ), "bin/cap.$SHLIBEXT", VFS) SMB_MODULE(vfs_expand_msdfs, \$(VFS_EXPAND_MSDFS_OBJ), "bin/expand_msdfs.$SHLIBEXT", VFS) SMB_MODULE(vfs_shadow_copy, \$(VFS_SHADOW_COPY_OBJ), "bin/shadow_copy.$SHLIBEXT", VFS) SMB_MODULE(vfs_afsacl, \$(VFS_AFSACL_OBJ), "bin/afsacl.$SHLIBEXT", VFS) -SMB_MODULE(vfs_gpfsacl, \$(VFS_GPFSACL_OBJ), "bin/gpfsacl.$SHLIBEXT", VFS) SMB_MODULE(vfs_posixacl, \$(VFS_POSIXACL_OBJ), "bin/posixacl.$SHLIBEXT", VFS) SMB_MODULE(vfs_aixacl, \$(VFS_AIXACL_OBJ), "bin/aixacl.$SHLIBEXT", VFS) -SMB_MODULE(vfs_aixacl2, \$(VFS_AIXACL2_OBJ), "bin/aixacl2.$SHLIBEXT", VFS) SMB_MODULE(vfs_solarisacl, \$(VFS_SOLARISACL_OBJ), "bin/solarisacl.$SHLIBEXT", VFS) SMB_MODULE(vfs_irixacl, \$(VFS_IRIXACL_OBJ), "bin/irixacl.$SHLIBEXT", VFS) SMB_MODULE(vfs_hpuxacl, \$(VFS_HPUXACL_OBJ), "bin/hpuxacl.$SHLIBEXT", VFS) diff --git a/source3/modules/nfs4_acls.c b/source3/modules/nfs4_acls.c index 5daab41b45..e69de29bb2 100644 --- a/source3/modules/nfs4_acls.c +++ b/source3/modules/nfs4_acls.c @@ -1,668 +0,0 @@ -/* - * NFS4 ACL handling - * - * Copyright (C) Jim McDonough, 2006 - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - */ - -#include "includes.h" -#include "nfs4_acls.h" - -#define SMBACL4_PARAM_TYPE_NAME "nfs4" - -#define SMB_ACE4_INT_MAGIC 0x76F8A967 -typedef struct _SMB_ACE4_INT_T -{ - uint32 magic; - SMB_ACE4PROP_T prop; - void *next; -} SMB_ACE4_INT_T; - -#define SMB_ACL4_INT_MAGIC 0x29A3E792 -typedef struct _SMB_ACL4_INT_T -{ - uint32 magic; - uint32 naces; - SMB_ACE4_INT_T *first; - SMB_ACE4_INT_T *last; -} SMB_ACL4_INT_T; - -extern struct current_user current_user; -extern int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_t gid); -extern BOOL unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, - uint32 security_info_sent, SEC_DESC *psd); - -static SMB_ACL4_INT_T *get_validated_aclint(SMB4ACL_T *acl) -{ - SMB_ACL4_INT_T *aclint = (SMB_ACL4_INT_T *)acl; - if (acl==NULL) - { - DEBUG(2, ("acl is NULL\n")); - errno = EINVAL; - return NULL; - } - if (aclint->magic!=SMB_ACL4_INT_MAGIC) - { - DEBUG(2, ("aclint bad magic 0x%x\n", aclint->magic)); - errno = EINVAL; - return NULL; - } - return aclint; -} - -static SMB_ACE4_INT_T *get_validated_aceint(SMB4ACE_T *ace) -{ - SMB_ACE4_INT_T *aceint = (SMB_ACE4_INT_T *)ace; - if (ace==NULL) - { - DEBUG(2, ("ace is NULL\n")); - errno = EINVAL; - return NULL; - } - if (aceint->magic!=SMB_ACE4_INT_MAGIC) - { - DEBUG(2, ("aceint bad magic 0x%x\n", aceint->magic)); - errno = EINVAL; - return NULL; - } - return aceint; -} - -SMB4ACL_T *smb_create_smb4acl(void) -{ - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - SMB_ACL4_INT_T *acl = (SMB_ACL4_INT_T *)talloc_size(mem_ctx, sizeof(SMB_ACL4_INT_T)); - if (acl==NULL) - { - DEBUG(0, ("talloc_size failed\n")); - errno = ENOMEM; - return NULL; - } - memset(acl, 0, sizeof(SMB_ACL4_INT_T)); - acl->magic = SMB_ACL4_INT_MAGIC; - /* acl->first, last = NULL not needed */ - return (SMB4ACL_T *)acl; -} - -SMB4ACE_T *smb_add_ace4(SMB4ACL_T *acl, SMB_ACE4PROP_T *prop) -{ - SMB_ACL4_INT_T *aclint = get_validated_aclint(acl); - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - SMB_ACE4_INT_T *ace; - - ace = (SMB_ACE4_INT_T *)talloc_size(mem_ctx, sizeof(SMB_ACE4_INT_T)); - if (ace==NULL) - { - DEBUG(0, ("talloc_size failed\n")); - errno = ENOMEM; - return NULL; - } - memset(ace, 0, sizeof(SMB_ACE4_INT_T)); - ace->magic = SMB_ACE4_INT_MAGIC; - /* ace->next = NULL not needed */ - memcpy(&ace->prop, prop, sizeof(SMB_ACE4PROP_T)); - - if (aclint->first==NULL) - { - aclint->first = ace; - aclint->last = ace; - } else { - aclint->last->next = (void *)ace; - aclint->last = ace; - } - aclint->naces++; - - return (SMB4ACE_T *)ace; -} - -SMB_ACE4PROP_T *smb_get_ace4(SMB4ACE_T *ace) -{ - SMB_ACE4_INT_T *aceint = get_validated_aceint(ace); - if (aceint==NULL) - return NULL; - - return &aceint->prop; -} - -SMB4ACE_T *smb_next_ace4(SMB4ACE_T *ace) -{ - SMB_ACE4_INT_T *aceint = get_validated_aceint(ace); - if (aceint==NULL) - return NULL; - - return (SMB4ACE_T *)aceint->next; -} - -SMB4ACE_T *smb_first_ace4(SMB4ACL_T *acl) -{ - SMB_ACL4_INT_T *aclint = get_validated_aclint(acl); - if (aclint==NULL) - return NULL; - - return (SMB4ACE_T *)aclint->first; -} - -uint32 smb_get_naces(SMB4ACL_T *acl) -{ - SMB_ACL4_INT_T *aclint = get_validated_aclint(acl); - if (aclint==NULL) - return 0; - - return aclint->naces; -} - -static int smbacl4_GetFileOwner(files_struct *fsp, SMB_STRUCT_STAT *psbuf) -{ - memset(psbuf, 0, sizeof(SMB_STRUCT_STAT)); - if (fsp->is_directory || fsp->fh->fd == -1) { - /* Get the stat struct for the owner info. */ - if (SMB_VFS_STAT(fsp->conn,fsp->fsp_name, psbuf) != 0) - { - DEBUG(8, ("SMB_VFS_STAT failed with error %s\n", - strerror(errno))); - return -1; - } - } else { - if (SMB_VFS_FSTAT(fsp,fsp->fh->fd, psbuf) != 0) - { - DEBUG(8, ("SMB_VFS_FSTAT failed with error %s\n", - strerror(errno))); - return -1; - } - } - - return 0; -} - -static BOOL smbacl4_nfs42win(SMB4ACL_T *acl, /* in */ - DOM_SID *psid_owner, /* in */ - DOM_SID *psid_group, /* in */ - SEC_ACE **ppnt_ace_list, /* out */ - int *pgood_aces /* out */ -) -{ - SMB_ACL4_INT_T *aclint = (SMB_ACL4_INT_T *)acl; - SMB_ACE4_INT_T *aceint; - SEC_ACE *nt_ace_list = NULL; - int good_aces = 0; - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - - DEBUG(10, ("smbacl_nfs42win entered")); - - aclint = get_validated_aclint(acl); - if (aclint==NULL) - return False; - - nt_ace_list = (SEC_ACE *)talloc_size(mem_ctx, aclint->naces * sizeof(SEC_ACE)); - if (nt_ace_list==NULL) - { - DEBUG(10, ("talloc error")); - errno = ENOMEM; - return False; - } - memset(nt_ace_list, 0, aclint->naces * sizeof(SEC_ACE)); - - for (aceint=aclint->first; aceint!=NULL; aceint=(SMB_ACE4_INT_T *)aceint->next) { - SEC_ACCESS mask; - DOM_SID sid; - SMB_ACE4PROP_T *ace = &aceint->prop; - - DEBUG(10, ("magic: 0x%x, type: %d, iflags: %x, flags: %x, mask: %x, " - "who: %d\n", aceint->magic, ace->aceType, ace->flags, - ace->aceFlags, ace->aceMask, ace->who.id)); - - SMB_ASSERT(aceint->magic==SMB_ACE4_INT_MAGIC); - - if (ace->flags & SMB_ACE4_ID_SPECIAL) { - switch (ace->who.special_id) { - case SMB_ACE4_WHO_OWNER: - sid_copy(&sid, psid_owner); - break; - case SMB_ACE4_WHO_GROUP: - sid_copy(&sid, psid_group); - break; - case SMB_ACE4_WHO_EVERYONE: - sid_copy(&sid, &global_sid_World); - break; - default: - DEBUG(8, ("invalid special who id %d " - "ignored\n", ace->who.special_id)); - } - } else { - if (ace->aceFlags & SMB_ACE4_IDENTIFIER_GROUP) { - gid_to_sid(&sid, ace->who.gid); - } else { - uid_to_sid(&sid, ace->who.uid); - } - } - DEBUG(10, ("mapped %d to %s\n", ace->who.id, - sid_string_static(&sid))); - - init_sec_access(&mask, ace->aceMask); - init_sec_ace(&nt_ace_list[good_aces++], &sid, - ace->aceType, mask, - ace->aceFlags & 0xf); - } - - *ppnt_ace_list = nt_ace_list; - *pgood_aces = good_aces; - - return True; -} - -size_t smb_get_nt_acl_nfs4(files_struct *fsp, - uint32 security_info, - SEC_DESC **ppdesc, SMB4ACL_T *acl) -{ - int good_aces = 0; - SMB_STRUCT_STAT sbuf; - DOM_SID sid_owner, sid_group; - size_t sd_size = 0; - SEC_ACE *nt_ace_list = NULL; - SEC_ACL *psa = NULL; - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - - DEBUG(10, ("smb_get_nt_acl_nfs4 invoked for %s\n", fsp->fsp_name)); - - if (acl==NULL || smb_get_naces(acl)==0) - return 0; /* special because we shouldn't alloc 0 for win */ - - if (smbacl4_GetFileOwner(fsp, &sbuf)) - return 0; - - uid_to_sid(&sid_owner, sbuf.st_uid); - gid_to_sid(&sid_group, sbuf.st_gid); - - if (smbacl4_nfs42win(acl, - &sid_owner, - &sid_group, - &nt_ace_list, - &good_aces - )==False) { - DEBUG(8,("smbacl4_nfs42win failed\n")); - return 0; - } - - psa = make_sec_acl(mem_ctx, NT4_ACL_REVISION, - good_aces, nt_ace_list); - if (psa == NULL) { - DEBUG(2,("make_sec_acl failed\n")); - return 0; - } - - DEBUG(10,("after make sec_acl\n")); - *ppdesc = make_sec_desc(mem_ctx, SEC_DESC_REVISION, - SEC_DESC_SELF_RELATIVE, - (security_info & OWNER_SECURITY_INFORMATION) - ? &sid_owner : NULL, - (security_info & GROUP_SECURITY_INFORMATION) - ? &sid_group : NULL, - NULL, psa, &sd_size); - if (*ppdesc==NULL) { - DEBUG(2,("make_sec_desc failed\n")); - return 0; - } - - DEBUG(10, ("smb_get_nt_acl_nfs4 successfully exited with sd_size %d\n", sd_size)); - return sd_size; -} - -enum smbacl4_mode_enum {e_simple=0, e_special=1}; -enum smbacl4_acedup_enum {e_dontcare=0, e_reject=1, e_ignore=2, e_merge=3}; - -typedef struct _smbacl4_vfs_params { - enum smbacl4_mode_enum mode; - BOOL do_chown; - enum smbacl4_acedup_enum acedup; -} smbacl4_vfs_params; - -/* - * Gather special parameters for NFS4 ACL handling - */ -static int smbacl4_get_vfs_params( - const char *type_name, - files_struct *fsp, - smbacl4_vfs_params *params -) -{ - static const struct enum_list enum_smbacl4_modes[] = { - { e_simple, "simple" }, - { e_special, "special" } - }; - static const struct enum_list enum_smbacl4_acedups[] = { - { e_dontcare, "dontcare" }, - { e_reject, "reject" }, - { e_ignore, "ignore" }, - { e_merge, "merge" }, - }; - - memset(params, 0, sizeof(smbacl4_vfs_params)); - params->mode = (enum smbacl4_mode_enum)lp_parm_enum( - SNUM(fsp->conn), type_name, - "mode", enum_smbacl4_modes, e_simple); - params->do_chown = lp_parm_bool(SNUM(fsp->conn), type_name, - "chown", True); - params->acedup = (enum smbacl4_acedup_enum)lp_parm_enum( - SNUM(fsp->conn), type_name, - "acedup", enum_smbacl4_acedups, e_dontcare); - - DEBUG(10, ("mode:%s, do_chown:%s, acedup: %s\n", - enum_smbacl4_modes[params->mode].name, - params->do_chown ? "true" : "false", - enum_smbacl4_acedups[params->acedup].name)); - - return 0; -} - -static void smbacl4_dump_nfs4acl(int level, SMB4ACL_T *acl) -{ - SMB_ACL4_INT_T *aclint = get_validated_aclint(acl); - SMB_ACE4_INT_T *aceint; - - DEBUG(level, ("NFS4ACL: size=%d\n", aclint->naces)); - - for(aceint = aclint->first; aceint!=NULL; aceint=(SMB_ACE4_INT_T *)aceint->next) { - SMB_ACE4PROP_T *ace = &aceint->prop; - - DEBUG(level, ("\tACE: type=%d, flags=0x%x, fflags=0x%x, mask=0x%x, id=%d\n", - ace->aceType, - ace->aceFlags, ace->flags, - ace->aceMask, - ace->who.id)); - } -} - -/* - * Find 2 NFS4 who-special ACE property (non-copy!!!) - * match nonzero if "special" and who is equal - * return ace if found matching; otherwise NULL - */ -static SMB_ACE4PROP_T *smbacl4_find_equal_special( - SMB4ACL_T *acl, - SMB_ACE4PROP_T *aceNew) -{ - SMB_ACL4_INT_T *aclint = get_validated_aclint(acl); - SMB_ACE4_INT_T *aceint; - - for(aceint = aclint->first; aceint!=NULL; aceint=(SMB_ACE4_INT_T *)aceint->next) { - SMB_ACE4PROP_T *ace = &aceint->prop; - - if (ace->flags == aceNew->flags && - ace->aceType==aceNew->aceType && - (ace->aceFlags&SMB_ACE4_IDENTIFIER_GROUP)== - (aceNew->aceFlags&SMB_ACE4_IDENTIFIER_GROUP) - ) { - /* keep type safety; e.g. gid is an u.short */ - if (ace->flags & SMB_ACE4_ID_SPECIAL) - { - if (ace->who.special_id==aceNew->who.special_id) - return ace; - } else { - if (ace->aceFlags & SMB_ACE4_IDENTIFIER_GROUP) - { - if (ace->who.gid==aceNew->who.gid) - return ace; - } else { - if (ace->who.uid==aceNew->who.uid) - return ace; - } - } - } - } - - return NULL; -} - -static int smbacl4_fill_ace4( - TALLOC_CTX *mem_ctx, - smbacl4_vfs_params *params, - uid_t ownerUID, - gid_t ownerGID, - SEC_ACE *ace_nt, /* input */ - SMB_ACE4PROP_T *ace_v4 /* output */ -) -{ - const char *dom, *name; - enum SID_NAME_USE type; - uid_t uid; - gid_t gid; - - DEBUG(10, ("got ace for %s\n", - sid_string_static(&ace_nt->trustee))); - - memset(ace_v4, 0, sizeof(SMB_ACE4PROP_T)); - ace_v4->aceType = ace_nt->type; /* only ACCES|DENY supported right now */ - ace_v4->aceFlags = ace_nt->flags & SEC_ACE_FLAG_VALID_INHERIT; - ace_v4->aceMask = ace_nt->info.mask & - (STD_RIGHT_ALL_ACCESS | SA_RIGHT_FILE_ALL_ACCESS); - - if (ace_v4->aceFlags!=ace_nt->flags) - DEBUG(9, ("ace_v4->aceFlags(0x%x)!=ace_nt->flags(0x%x)\n", - ace_v4->aceFlags, ace_nt->flags)); - - if (ace_v4->aceMask!=ace_nt->info.mask) - DEBUG(9, ("ace_v4->aceMask(0x%x)!=ace_nt->info.mask(0x%x)\n", - ace_v4->aceMask, ace_nt->info.mask)); - - if (sid_equal(&ace_nt->trustee, &global_sid_World)) { - ace_v4->who.special_id = SMB_ACE4_WHO_EVERYONE; - ace_v4->flags |= SMB_ACE4_ID_SPECIAL; - } else { - if (!lookup_sid(mem_ctx, &ace_nt->trustee, &dom, &name, &type)) { - DEBUG(8, ("Could not find %s' type\n", - sid_string_static(&ace_nt->trustee))); - errno = EINVAL; - return -1; - } - - if (type == SID_NAME_USER) { - if (!sid_to_uid(&ace_nt->trustee, &uid)) { - DEBUG(2, ("Could not convert %s to uid\n", - sid_string_static(&ace_nt->trustee))); - return -1; - } - - if (params->mode==e_special && uid==ownerUID) { - ace_v4->flags |= SMB_ACE4_ID_SPECIAL; - ace_v4->who.special_id = SMB_ACE4_WHO_OWNER; - } else { - ace_v4->who.uid = uid; - } - } else { /* else group? - TODO check it... */ - if (!sid_to_gid(&ace_nt->trustee, &gid)) { - DEBUG(2, ("Could not convert %s to gid\n", - sid_string_static(&ace_nt->trustee))); - return -1; - } - ace_v4->aceFlags |= SMB_ACE4_IDENTIFIER_GROUP; - - if (params->mode==e_special && gid==ownerGID) { - ace_v4->flags |= SMB_ACE4_ID_SPECIAL; - ace_v4->who.special_id = SMB_ACE4_WHO_GROUP; - } else { - ace_v4->who.gid = gid; - } - } - } - - return 0; /* OK */ -} - -static int smbacl4_MergeIgnoreReject( - enum smbacl4_acedup_enum acedup, - SMB4ACL_T *acl, /* may modify it */ - SMB_ACE4PROP_T *ace, /* the "new" ACE */ - BOOL *paddNewACE, - int i -) -{ - int result = 0; - SMB_ACE4PROP_T *ace4found = smbacl4_find_equal_special(acl, ace); - if (ace4found) - { - switch(acedup) - { - case e_merge: /* "merge" flags */ - *paddNewACE = False; - ace4found->aceFlags |= ace->aceFlags; - ace4found->aceMask |= ace->aceMask; - break; - case e_ignore: /* leave out this record */ - *paddNewACE = False; - break; - case e_reject: /* do an error */ - DEBUG(8, ("ACL rejected by duplicate nt ace#%d\n", i)); - errno = EINVAL; /* SHOULD be set on any _real_ error */ - result = -1; - break; - default: - break; - } - } - return result; -} - -static SMB4ACL_T *smbacl4_win2nfs4( - SEC_ACL *dacl, - smbacl4_vfs_params *pparams, - uid_t ownerUID, - gid_t ownerGID -) -{ - SMB4ACL_T *acl; - uint32 i; - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - - DEBUG(10, ("smbacl4_win2nfs4 invoked\n")); - - acl = smb_create_smb4acl(); - if (acl==NULL) - return NULL; - - for(i=0; i<dacl->num_aces; i++) { - SMB_ACE4PROP_T ace_v4; - BOOL addNewACE = True; - - if (smbacl4_fill_ace4(mem_ctx, pparams, ownerUID, ownerGID, - dacl->ace + i, &ace_v4)) - return NULL; - - if (pparams->acedup!=e_dontcare) { - if (smbacl4_MergeIgnoreReject(pparams->acedup, acl, - &ace_v4, &addNewACE, i)) - return NULL; - } - - if (addNewACE) - smb_add_ace4(acl, &ace_v4); - } - - return acl; -} - -BOOL smb_set_nt_acl_nfs4(files_struct *fsp, - uint32 security_info_sent, - SEC_DESC *psd, - set_nfs4acl_native_fn_t set_nfs4_native) -{ - smbacl4_vfs_params params; - SMB4ACL_T *acl = NULL; - BOOL result; - - SMB_STRUCT_STAT sbuf; - BOOL need_chown = False; - uid_t newUID = (uid_t)-1; - gid_t newGID = (gid_t)-1; - - DEBUG(10, ("smb_set_nt_acl_nfs4 invoked for %s\n", fsp->fsp_name)); - - if ((security_info_sent & (DACL_SECURITY_INFORMATION | - GROUP_SECURITY_INFORMATION | OWNER_SECURITY_INFORMATION)) == 0) - { - DEBUG(9, ("security_info_sent (0x%x) ignored\n", - security_info_sent)); - return True; /* won't show error - later to be refined... */ - } - - /* Special behaviours */ - if (smbacl4_get_vfs_params(SMBACL4_PARAM_TYPE_NAME, fsp, ¶ms)) - return False; - - if (smbacl4_GetFileOwner(fsp, &sbuf)) - return False; - - /* chown logic is a copy/paste from posix_acl.c:set_nt_acl */ - if (!unpack_nt_owners(SNUM(fsp->conn), &newUID, &newGID, security_info_sent, psd)) - { - DEBUG(8, ("unpack_nt_owners failed")); - return False; - } - if (((newUID != (uid_t)-1) && (sbuf.st_uid != newUID)) || - ((newGID != (gid_t)-1) && (sbuf.st_gid != newGID))) { - need_chown = True; - } - if (need_chown) { - if ((newUID == (uid_t)-1 || newUID == current_user.ut.uid)) { - if(try_chown(fsp->conn, fsp->fsp_name, newUID, newGID)) { - DEBUG(3,("chown %s, %u, %u failed. Error = %s.\n", - fsp->fsp_name, (unsigned int)newUID, (unsigned int)newGID, strerror(errno) )); - return False; - } - DEBUG(10,("chown %s, %u, %u succeeded.\n", - fsp->fsp_name, (unsigned int)newUID, (unsigned int)newGID)); - if (smbacl4_GetFileOwner(fsp, &sbuf)) - return False; - need_chown = False; - } else { /* chown is needed, but _after_ changing acl */ - sbuf.st_uid = newUID; /* OWNER@ in case of e_special */ - sbuf.st_gid = newGID; /* GROUP@ in case of e_special */ - } - } - - if ((security_info_sent & DACL_SECURITY_INFORMATION)!=0 && psd->dacl!=NULL) - { - acl = smbacl4_win2nfs4(psd->dacl, ¶ms, sbuf.st_uid, sbuf.st_gid); - if (!acl) - return False; - - smbacl4_dump_nfs4acl(10, acl); - - result = set_nfs4_native(fsp, acl); - if (result!=True) - { - DEBUG(10, ("set_nfs4_native failed with %s\n", strerror(errno))); - return False; - } - } else - DEBUG(10, ("no dacl found; security_info_sent = 0x%x\n", security_info_sent)); - - /* Any chown pending? */ - if (need_chown) { - DEBUG(3,("chown#2 %s. uid = %u, gid = %u.\n", - fsp->fsp_name, (unsigned int)newUID, (unsigned int)newGID)); - if (try_chown(fsp->conn, fsp->fsp_name, newUID, newGID)) { - DEBUG(2,("chown#2 %s, %u, %u failed. Error = %s.\n", - fsp->fsp_name, (unsigned int)newUID, (unsigned int)newGID, - strerror(errno))); - return False; - } - DEBUG(10,("chown#2 %s, %u, %u succeeded.\n", - fsp->fsp_name, (unsigned int)newUID, (unsigned int)newGID)); - } - - DEBUG(10, ("smb_set_nt_acl_nfs4 succeeded\n")); - return True; -} diff --git a/source3/modules/nfs4_acls.h b/source3/modules/nfs4_acls.h index 469a50af56..e69de29bb2 100644 --- a/source3/modules/nfs4_acls.h +++ b/source3/modules/nfs4_acls.h @@ -1,146 +0,0 @@ -/* - * NFS4 ACL handling - * - * Copyright (C) Jim McDonough, 2006 - * Reused & renamed some parts of AIX 5.3 sys/acl.h structures - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - */ - -#ifndef __NFS4_ACLS_H__ -#define __NFS4_ACLS_H__ - -#define SMB_ACLTYPE_NONE 0 -#define SMB_ACLTYPE_UNKNOWN 1 -#define SMB_ACLTYPE_POSIX 2 -#define SMB_ACLTYPE_NFS4 4 - -/* - * Following union captures the identity as - * used in the NFS4 ACL structures. - */ -typedef union _SMB_NFS4_ACEWHOID_T { - uid_t uid; /* User id */ - gid_t gid; /* Group id */ - uint32 special_id; /* Identifies special identities in NFS4 */ - -#define SMB_ACE4_WHO_OWNER 0x00000001 /*The owner of the file. */ -#define SMB_ACE4_WHO_GROUP 0x00000002 /*The group associated with the file. */ -#define SMB_ACE4_WHO_EVERYONE 0x00000003 /*The world. */ -#define SMB_ACE4_WHO_INTERACTIVE 0x00000004 /*Accessed from an interactive terminal. */ -#define SMB_ACE4_WHO_NETWORK 0x00000005 /*Accessed via the network. */ -#define SMB_ACE4_WHO_DIALUP 0x00000006 /*Accessed as a dialup user to the server. */ -#define SMB_ACE4_WHO_BATCH 0x00000007 /*Accessed from a batch job. */ -#define SMB_ACE4_WHO_ANONYMOUS 0x00000008 /*Accessed without any authentication. */ -#define SMB_ACE4_WHO_AUTHENTICATED 0x00000009 /*Any authenticated user (opposite of ANONYMOUS) */ -#define SMB_ACE4_WHO_SERVICE 0x0000000A /*Access from a system service. */ -#define SMB_ACE4_WHO_MAX SMB_ACE4_WHO_SERVICE /* largest valid ACE4_WHO */ - uint32 id; -} SMB_NFS4_ACEWHOID_T; - -typedef struct _SMB_ACE4PROP_T { - uint32 flags; /* Bit mask defining details of ACE */ -/*The following are constants for flags field */ -/* #define SMB_ACE4_ID_NOT_VALID 0x00000001 - from aix/jfs2 */ -#define SMB_ACE4_ID_SPECIAL 0x00000002 - - SMB_NFS4_ACEWHOID_T who; /* Identifies to whom this ACE applies */ - - /* The following part of ACE has the same layout as NFSv4 wire format. */ - - uint32 aceType; /* Type of ACE PERMIT/ALLOW etc*/ -/*The constants used for the type field (acetype4) are as follows: */ -#define SMB_ACE4_ACCESS_ALLOWED_ACE_TYPE 0x00000000 -#define SMB_ACE4_ACCESS_DENIED_ACE_TYPE 0x00000001 -#define SMB_ACE4_SYSTEM_AUDIT_ACE_TYPE 0x00000002 -#define SMB_ACE4_SYSTEM_ALARM_ACE_TYPE 0x00000003 -#define SMB_ACE4_MAX_TYPE ACE4_SYSTEM_ALARM_ACE_TYPE /* largest valid ACE4_TYPE */ - - uint32 aceFlags; /* Controls Inheritance and such */ -/*The bitmask constants used for the flag field are as follows: */ -#define SMB_ACE4_FILE_INHERIT_ACE 0x00000001 -#define SMB_ACE4_DIRECTORY_INHERIT_ACE 0x00000002 -#define SMB_ACE4_NO_PROPAGATE_INHERIT_ACE 0x00000004 -#define SMB_ACE4_INHERIT_ONLY_ACE 0x00000008 -#define SMB_ACE4_SUCCESSFUL_ACCESS_ACE_FLAG 0x00000010 -#define SMB_ACE4_FAILED_ACCESS_ACE_FLAG 0x00000020 -#define SMB_ACE4_IDENTIFIER_GROUP 0x00000040 -#define SMB_ACE4_ALL_FLAGS ( SMB_ACE4_FILE_INHERIT_ACE | SMB_ACE4_DIRECTORY_INHERIT_ACE \ -| SMB_ACE4_NO_PROPAGATE_INHERIT_ACE | SMB_ACE4_INHERIT_ONLY_ACE | SMB_ACE4_SUCCESSFUL_ACCESS_ACE_FLAG \ -| SMB_ACE4_FAILED_ACCESS_ACE_FLAG | SMB_ACE4_IDENTIFIER_GROUP ) - - uint32 aceMask; /* Access rights */ -/*The bitmask constants used for the access mask field are as follows: */ -#define SMB_ACE4_READ_DATA 0x00000001 -#define SMB_ACE4_LIST_DIRECTORY 0x00000001 -#define SMB_ACE4_WRITE_DATA 0x00000002 -#define SMB_ACE4_ADD_FILE 0x00000002 -#define SMB_ACE4_APPEND_DATA 0x00000004 -#define SMB_ACE4_ADD_SUBDIRECTORY 0x00000004 -#define SMB_ACE4_READ_NAMED_ATTRS 0x00000008 -#define SMB_ACE4_WRITE_NAMED_ATTRS 0x00000010 -#define SMB_ACE4_EXECUTE 0x00000020 -#define SMB_ACE4_DELETE_CHILD 0x00000040 -#define SMB_ACE4_READ_ATTRIBUTES 0x00000080 -#define SMB_ACE4_WRITE_ATTRIBUTES 0x00000100 -#define SMB_ACE4_DELETE 0x00010000 -#define SMB_ACE4_READ_ACL 0x00020000 -#define SMB_ACE4_WRITE_ACL 0x00040000 -#define SMB_ACE4_WRITE_OWNER 0x00080000 -#define SMB_ACE4_SYNCHRONIZE 0x00100000 -#define SMB_ACE4_ALL_MASKS ( SMB_ACE4_READ_DATA | SMB_ACE4_LIST_DIRECTORY \ -| SMB_ACE4_WRITE_DATA | SMB_ACE4_ADD_FILE | SMB_ACE4_APPEND_DATA | SMB_ACE4_ADD_SUBDIRECTORY \ -| SMB_ACE4_READ_NAMED_ATTRS | SMB_ACE4_WRITE_NAMED_ATTRS | SMB_ACE4_EXECUTE | SMB_ACE4_DELETE_CHILD \ -| SMB_ACE4_READ_ATTRIBUTES | SMB_ACE4_WRITE_ATTRIBUTES | SMB_ACE4_DELETE | SMB_ACE4_READ_ACL \ -| SMB_ACE4_WRITE_ACL | SMB_ACE4_WRITE_OWNER | SMB_ACE4_SYNCHRONIZE ) -} SMB_ACE4PROP_T; - -/* - * Never allocate these structures on your own - * use create_smb4acl instead - */ -typedef struct _SMB4ACL_T {char dontuse;} SMB4ACL_T; -typedef struct _SMB4ACE_T {char dontuse;} SMB4ACE_T; - -SMB4ACL_T *smb_create_smb4acl(void); - -/* prop's contents are copied */ -/* it doesn't change the order, appends */ -SMB4ACE_T *smb_add_ace4(SMB4ACL_T *acl, SMB_ACE4PROP_T *prop); - -SMB_ACE4PROP_T *smb_get_ace4(SMB4ACE_T *ace); - -/* Returns NULL if none - or error */ -SMB4ACE_T *smb_first_ace4(SMB4ACL_T *acl); - -/* Returns NULL in the end - or error */ -SMB4ACE_T *smb_next_ace4(SMB4ACE_T *ace); - -uint32 smb_get_naces(SMB4ACL_T *acl); - -size_t smb_get_nt_acl_nfs4(files_struct *fsp, - uint32 security_info, - SEC_DESC **ppdesc, SMB4ACL_T *acl); - -/* Callback function needed to set the native acl - * when applicable */ -typedef BOOL (*set_nfs4acl_native_fn_t)(files_struct *, SMB4ACL_T *); - -BOOL smb_set_nt_acl_nfs4(files_struct *fsp, - uint32 security_info_sent, - SEC_DESC *psd, - set_nfs4acl_native_fn_t set_nfs4_native); - -#endif /* __NFS4_ACLS_H__ */ diff --git a/source3/modules/vfs_aixacl2.c b/source3/modules/vfs_aixacl2.c index 623152b710..e69de29bb2 100644 --- a/source3/modules/vfs_aixacl2.c +++ b/source3/modules/vfs_aixacl2.c @@ -1,537 +0,0 @@ -/* - * Convert JFS2 NFS4/AIXC acls to NT acls and vice versa. - * - * Copyright (C) Volker Lendecke, 2006 - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - */ - -#include "includes.h" -#include "nfs4_acls.c" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_VFS - -#define AIXACL2_MODULE_NAME "aixacl2" - -extern struct current_user current_user; -extern int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_t gid); -extern BOOL unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, - uint32 security_info_sent, SEC_DESC *psd); - -extern SMB_ACL_T aixacl_to_smbacl( struct acl *file_acl); -extern struct acl *aixacl_smb_to_aixacl(SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl); - -typedef union aixjfs2_acl_t { - nfs4_acl_int_t jfs2_acl[1]; - aixc_acl_t aixc_acl[1]; -}AIXJFS2_ACL_T; - -static int32_t aixacl2_getlen(AIXJFS2_ACL_T *acl, acl_type_t *type) -{ - int32_t len; - - if(type->u64 == ACL_NFS4) { - len = acl->jfs2_acl[0].aclLength; - } - else { - if(type->u64 == ACL_AIXC) { - len = acl->aixc_acl[0].acl_len; - } else { - DEBUG(0,("aixacl2_getlen:unknown type:%d\n",type->u64)); - return False; - } - } - DEBUG(10,("aixacl2_getlen:%d\n",len)); - return len; -} - -static AIXJFS2_ACL_T *aixjfs2_getacl_alloc(const char *fname, acl_type_t *type) -{ - AIXJFS2_ACL_T *acl; - size_t len = 200; - mode_t mode; - int ret; - uint64_t ctl_flag=0; - TALLOC_CTX *mem_ctx; - - mem_ctx = main_loop_talloc_get(); - acl = (AIXJFS2_ACL_T *)talloc_size(mem_ctx, len); - if (acl == NULL) { - errno = ENOMEM; - return NULL; - } - - if(type->u64 == ACL_ANY) { - ctl_flag = ctl_flag | GET_ACLINFO_ONLY; - } - - ret = aclx_get((char *)fname, ctl_flag, type, acl, &len, &mode); - if ((ret != 0) && (errno == ENOSPC)) { - len = aixacl2_getlen(acl, type) + sizeof(AIXJFS2_ACL_T); - DEBUG(10,("aixjfs2_getacl_alloc - acl_len:%d\n",len)); - - acl = (AIXJFS2_ACL_T *)talloc_size(mem_ctx, len); - if (acl == NULL) { - errno = ENOMEM; - return NULL; - } - - ret = aclx_get((char *)fname, ctl_flag, type, acl, &len, &mode); - } - if (ret != 0) { - DEBUG(8, ("aclx_get failed with %s\n", strerror(errno))); - return NULL; - } - - return acl; -} - -static BOOL aixjfs2_get_nfs4_acl(files_struct *fsp, - SMB4ACL_T **ppacl, BOOL *pretryPosix) -{ - int32_t i; - - AIXJFS2_ACL_T *pacl = NULL; - nfs4_acl_int_t *jfs2_acl = NULL; - nfs4_ace_int_t *jfs2_ace = NULL; - acl_type_t type; - - DEBUG(10,("jfs2 get_nt_acl invoked for %s\n", fsp->fsp_name)); - - memset(&type, 0, sizeof(acl_type_t)); - type.u64 = ACL_NFS4; - - pacl = aixjfs2_getacl_alloc(fsp->fsp_name, &type); - if (pacl == NULL) { - DEBUG(9, ("aixjfs2_getacl_alloc failed for %s with %s\n", - fsp->fsp_name, strerror(errno))); - if (errno==ENOSYS) - *pretryPosix = True; - return False; - } - - jfs2_acl = &pacl->jfs2_acl[0]; - DEBUG(10, ("len: %d, version: %d, nace: %d, type: 0x%x\n", - jfs2_acl->aclLength, jfs2_acl->aclVersion, jfs2_acl->aclEntryN, type.u64)); - - *ppacl = smb_create_smb4acl(); - if (*ppacl==NULL) - return False; - - jfs2_ace = &jfs2_acl->aclEntry[0]; - for (i=0; i<jfs2_acl->aclEntryN; i++) { - SMB_ACE4PROP_T aceprop; - - DEBUG(10, ("type: %d, iflags: %x, flags: %x, mask: %x, " - "who: %d, aclLen: %d\n", jfs2_ace->aceType, jfs2_ace->flags, - jfs2_ace->aceFlags, jfs2_ace->aceMask, jfs2_ace->aceWho.id, jfs2_ace->entryLen)); - - aceprop.aceType = jfs2_ace->aceType; - aceprop.aceFlags = jfs2_ace->aceFlags; - aceprop.aceMask = jfs2_ace->aceMask; - aceprop.flags = (jfs2_ace->flags&ACE4_ID_SPECIAL) ? SMB_ACE4_ID_SPECIAL : 0; - - /* don't care it's real content is only 16 or 32 bit */ - aceprop.who.id = jfs2_ace->aceWho.id; - - if (smb_add_ace4(*ppacl, &aceprop)==NULL) - return False; - - /* iterate to the next jfs2 ace */ - jfs2_ace = (nfs4_ace_int_t *)(((char *)jfs2_ace) + jfs2_ace->entryLen); - } - - DEBUG(10,("jfs2 get_nt_acl finished successfully\n")); - - return True; -} - -static size_t aixjfs2_get_nt_acl_common(files_struct *fsp, - uint32 security_info, SEC_DESC **ppdesc) -{ - SMB4ACL_T *pacl = NULL; - BOOL result; - BOOL retryPosix = False; - - *ppdesc = NULL; - result = aixjfs2_get_nfs4_acl(fsp, &pacl, &retryPosix); - if (retryPosix) - { - DEBUG(10, ("retrying with posix acl...\n")); - return get_nt_acl(fsp, security_info, ppdesc); - } - if (result==False) - return 0; - - return smb_get_nt_acl_nfs4(fsp, security_info, ppdesc, pacl); -} - -size_t aixjfs2_fget_nt_acl(vfs_handle_struct *handle, - files_struct *fsp, int fd, uint32 security_info, - SEC_DESC **ppdesc) -{ - return aixjfs2_get_nt_acl_common(fsp, security_info, ppdesc); -} - -size_t aixjfs2_get_nt_acl(vfs_handle_struct *handle, - files_struct *fsp, const char *name, - uint32 security_info, SEC_DESC **ppdesc) -{ - return aixjfs2_get_nt_acl_common(fsp, security_info, ppdesc); -} - -static SMB_ACL_T aixjfs2_get_posix_acl(const char *path, acl_type_t type) -{ - aixc_acl_t *pacl; - AIXJFS2_ACL_T *acl; - SMB_ACL_T result = NULL; - int ret; - - acl = aixjfs2_getacl_alloc(path, &type); - - if (acl == NULL) { - DEBUG(10, ("aixjfs2_getacl failed for %s with %s\n", - path, strerror(errno))); - if (errno == 0) { - errno = EINVAL; - } - goto done; - } - - pacl = &acl->aixc_acl[0]; - DEBUG(10, ("len: %d, mode: %d\n", - pacl->acl_len, pacl->acl_mode)); - - result = aixacl_to_smbacl(pacl); - if (result == NULL) { - goto done; - } - - done: - if (errno != 0) { - SAFE_FREE(result); - } - return result; -} - -SMB_ACL_T aixjfs2_sys_acl_get_file(vfs_handle_struct *handle, - const char *path_p, - SMB_ACL_TYPE_T type) -{ - acl_type_t aixjfs2_type; - - switch(type) { - case SMB_ACL_TYPE_ACCESS: - aixjfs2_type.u64 = ACL_AIXC; - break; - case SMB_ACL_TYPE_DEFAULT: - DEBUG(0, ("Got AIX JFS2 unsupported type: %d\n", type)); - return NULL; - default: - DEBUG(0, ("Got invalid type: %d\n", type)); - smb_panic("exiting"); - } - - return aixjfs2_get_posix_acl(path_p, aixjfs2_type); -} - -SMB_ACL_T aixjfs2_sys_acl_get_fd(vfs_handle_struct *handle, - files_struct *fsp, - int fd) -{ - acl_type_t aixjfs2_type; - aixjfs2_type.u64 = ACL_AIXC; - - return aixjfs2_get_posix_acl(fsp->fsp_name, aixjfs2_type); -} - -/* - * Test whether we have that aclType support on the given path - */ -static int aixjfs2_query_acl_support( - char *filepath, - uint64_t aclType, - acl_type_t *pacl_type_info -) -{ - acl_types_list_t acl_type_list; - size_t acl_type_list_len = sizeof(acl_types_list_t); - uint32_t i; - - memset(&acl_type_list, 0, sizeof(acl_type_list)); - - if (aclx_gettypes(filepath, &acl_type_list, &acl_type_list_len)) { - DEBUG(2, ("aclx_gettypes failed with error %s for %s\n", - strerror(errno), filepath)); - return -1; - } - - for(i=0; i<acl_type_list.num_entries; i++) { - if (acl_type_list.entries[i].u64==aclType) { - memcpy(pacl_type_info, acl_type_list.entries + i, sizeof(acl_type_t)); - DEBUG(10, ("found %s ACL support for %s\n", - pacl_type_info->acl_type, filepath)); - return 0; - } - } - - return 1; /* haven't found that ACL type. */ -} - -static BOOL aixjfs2_process_smbacl(files_struct *fsp, SMB4ACL_T *smbacl) -{ - SMB4ACE_T *smbace; - TALLOC_CTX *mem_ctx; - nfs4_acl_int_t *jfs2acl; - int32_t entryLen; - uint32 aclLen, naces; - int rc; - acl_type_t acltype; - - DEBUG(10, ("jfs2_process_smbacl invoked on %s\n", fsp->fsp_name)); - - /* no need to be freed which is alloced with mem_ctx */ - mem_ctx = main_loop_talloc_get(); - - entryLen = sizeof(nfs4_ace_int_t); - if (entryLen & 0x03) - entryLen = entryLen + 4 - (entryLen%4); - - naces = smb_get_naces(smbacl); - aclLen = ACL_V4_SIZ + naces * entryLen; - jfs2acl = (nfs4_acl_int_t *)talloc_size(mem_ctx, aclLen); - if (jfs2acl==NULL) { - DEBUG(0, ("talloc_size failed\n")); - errno = ENOMEM; - return False; - } - - jfs2acl->aclLength = ACL_V4_SIZ; - jfs2acl->aclVersion = NFS4_ACL_INT_STRUCT_VERSION; - jfs2acl->aclEntryN = 0; - - for(smbace = smb_first_ace4(smbacl); smbace!=NULL; smbace = smb_next_ace4(smbace)) - { - SMB_ACE4PROP_T *aceprop = smb_get_ace4(smbace); - nfs4_ace_int_t *jfs2_ace = (nfs4_ace_int_t *)(((char *)jfs2acl) + jfs2acl->aclLength); - - memset(jfs2_ace, 0, entryLen); - jfs2_ace->entryLen = entryLen; /* won't store textual "who" */ - jfs2_ace->aceType = aceprop->aceType; /* only ACCES|DENY supported by jfs2 */ - jfs2_ace->aceFlags = aceprop->aceFlags; - jfs2_ace->aceMask = aceprop->aceMask; - jfs2_ace->flags = (aceprop->flags&SMB_ACE4_ID_SPECIAL) ? ACE4_ID_SPECIAL : 0; - - /* don't care it's real content is only 16 or 32 bit */ - jfs2_ace->aceWho.id = aceprop->who.id; - - /* iterate to the next jfs2 ace */ - jfs2acl->aclLength += jfs2_ace->entryLen; - jfs2acl->aclEntryN++; - } - SMB_ASSERT(jfs2acl->aclEntryN==naces); - - /* Don't query it (again) */ - memset(&acltype, 0, sizeof(acl_type_t)); - acltype.u64 = ACL_NFS4; - - /* won't set S_ISUID - the only one JFS2/NFS4 accepts */ - rc = aclx_put( - fsp->fsp_name, - SET_ACL, /* set only the ACL, not mode bits */ - acltype, /* not a pointer !!! */ - jfs2acl, - jfs2acl->aclLength, - 0 /* don't set here mode bits */ - ); - if (rc) { - DEBUG(8, ("aclx_put failed with %s\n", strerror(errno))); - return False; - } - - DEBUG(10, ("jfs2_process_smbacl succeeded.\n")); - return True; -} - -static BOOL aixjfs2_set_nt_acl_common(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd) -{ - acl_type_t acl_type_info; - BOOL result = False; - int rc; - - rc = aixjfs2_query_acl_support( - fsp->fsp_name, - ACL_NFS4, - &acl_type_info); - - if (rc==0) - { - result = smb_set_nt_acl_nfs4( - fsp, security_info_sent, psd, - aixjfs2_process_smbacl); - } else if (rc==1) { /* assume POSIX ACL - by default... */ - result = set_nt_acl(fsp, security_info_sent, psd); - } else - result = False; /* query failed */ - - return result; -} - -BOOL aixjfs2_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int fd, uint32 security_info_sent, SEC_DESC *psd) -{ - return aixjfs2_set_nt_acl_common(fsp, security_info_sent, psd); -} - -BOOL aixjfs2_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const char *name, uint32 security_info_sent, SEC_DESC *psd) -{ - return aixjfs2_set_nt_acl_common(fsp, security_info_sent, psd); -} - -int aixjfs2_sys_acl_set_file(vfs_handle_struct *handle, - const char *name, - SMB_ACL_TYPE_T type, - SMB_ACL_T theacl) -{ - struct acl *acl_aixc; - acl_type_t acl_type_info; - int rc; - - DEBUG(10, ("aixjfs2_sys_acl_set_file invoked for %s", name)); - - rc = aixjfs2_query_acl_support((char *)name, ACL_AIXC, &acl_type_info); - if (rc) { - DEBUG(8, ("jfs2_set_nt_acl: AIXC support not found\n")); - return -1; - } - - acl_aixc = aixacl_smb_to_aixacl(type, theacl); - if (!acl_aixc) - return -1; - - rc = aclx_put( - (char *)name, - SET_ACL, /* set only the ACL, not mode bits */ - acl_type_info, - acl_aixc, - acl_aixc->acl_len, - 0 - ); - if (rc) { - DEBUG(2, ("aclx_put failed with %s for %s\n", - strerror(errno), name)); - return -1; - } - - return 0; -} - -int aixjfs2_sys_acl_set_fd(vfs_handle_struct *handle, - files_struct *fsp, - int fd, SMB_ACL_T theacl) -{ - struct acl *acl_aixc; - acl_type_t acl_type_info; - int rc; - - DEBUG(10, ("aixjfs2_sys_acl_set_fd invoked for %s", fsp->fsp_name)); - - rc = aixjfs2_query_acl_support(fsp->fsp_name, ACL_AIXC, &acl_type_info); - if (rc) { - DEBUG(8, ("jfs2_set_nt_acl: AIXC support not found\n")); - return -1; - } - - acl_aixc = aixacl_smb_to_aixacl(SMB_ACL_TYPE_ACCESS, theacl); - if (!acl_aixc) - return -1; - - rc = aclx_fput( - fd, - SET_ACL, /* set only the ACL, not mode bits */ - acl_type_info, - acl_aixc, - acl_aixc->acl_len, - 0 - ); - if (rc) { - DEBUG(2, ("aclx_fput failed with %s for %s\n", - strerror(errno), fsp->fsp_name)); - return -1; - } - - return 0; -} - -int aixjfs2_sys_acl_delete_def_file(vfs_handle_struct *handle, - const char *path) -{ - /* Not available under AIXC ACL */ - /* Don't report here any error otherwise */ - /* upper layer will break the normal execution */ - return 0; -} - - -/* VFS operations structure */ - -static vfs_op_tuple aixjfs2_ops[] = -{ - {SMB_VFS_OP(aixjfs2_fget_nt_acl), - SMB_VFS_OP_FGET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_get_nt_acl), - SMB_VFS_OP_GET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_fset_nt_acl), - SMB_VFS_OP_FSET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_set_nt_acl), - SMB_VFS_OP_SET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_sys_acl_get_file), - SMB_VFS_OP_SYS_ACL_GET_FILE, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_sys_acl_get_fd), - SMB_VFS_OP_SYS_ACL_GET_FD, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_sys_acl_set_file), - SMB_VFS_OP_SYS_ACL_SET_FILE, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_sys_acl_set_fd), - SMB_VFS_OP_SYS_ACL_SET_FD, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(aixjfs2_sys_acl_delete_def_file), - SMB_VFS_OP_SYS_ACL_DELETE_DEF_FILE, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(NULL), - SMB_VFS_OP_NOOP, - SMB_VFS_LAYER_NOOP} -}; - -NTSTATUS vfs_aixacl2_init(void) -{ - return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, AIXACL2_MODULE_NAME, - aixjfs2_ops); -} diff --git a/source3/modules/vfs_gpfsacl.c b/source3/modules/vfs_gpfsacl.c index b66200fe56..e69de29bb2 100644 --- a/source3/modules/vfs_gpfsacl.c +++ b/source3/modules/vfs_gpfsacl.c @@ -1,610 +0,0 @@ -/* - * Convert GPFS acls to NT acls and vice versa. - * - * Copyright (C) Volker Lendecke, 2006 - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - */ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_VFS - -#include <gpfs.h> -#include "nfs4_acls.h" - -static void gpfs_dumpacl(int level, struct gpfs_acl *gacl) -{ - int i; - if (gacl==NULL) - { - DEBUG(0, ("gpfs acl is NULL\n")); - return; - } - - DEBUG(level, ("gpfs acl: nace: %d, type:%d, version:%d, level:%d, len:%d\n", - gacl->acl_nace, gacl->acl_type, gacl->acl_version, gacl->acl_level, gacl->acl_len)); - for(i=0; i<gacl->acl_nace; i++) - { - struct gpfs_ace_v4 *gace = gacl->ace_v4 + i; - DEBUG(level, ("\tace[%d]: type:%d, flags:0x%x, mask:0x%x, iflags:0x%x, who:%u\n", - i, gace->aceType, gace->aceFlags, gace->aceMask, - gace->aceIFlags, gace->aceWho)); - } -} - -static struct gpfs_acl *gpfs_getacl_alloc(const char *fname, gpfs_aclType_t type) -{ - struct gpfs_acl *acl; - size_t len = 200; - int ret; - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - - acl = (struct gpfs_acl *)talloc_size(mem_ctx, len); - if (acl == NULL) { - errno = ENOMEM; - return NULL; - } - - acl->acl_len = len; - acl->acl_level = 0; - acl->acl_version = 0; - acl->acl_type = type; - - ret = smbd_gpfs_getacl((char *)fname, GPFS_GETACL_STRUCT, acl); - if ((ret != 0) && (errno == ENOSPC)) { - struct gpfs_acl *new_acl = (struct gpfs_acl *)talloc_size( - mem_ctx, acl->acl_len + sizeof(struct gpfs_acl)); - if (new_acl == NULL) { - errno = ENOMEM; - return NULL; - } - - new_acl->acl_len = acl->acl_len; - new_acl->acl_level = acl->acl_level; - new_acl->acl_version = acl->acl_version; - new_acl->acl_type = acl->acl_type; - acl = new_acl; - - ret = smbd_gpfs_getacl((char *)fname, GPFS_GETACL_STRUCT, acl); - } - if (ret != 0) - { - DEBUG(8, ("smbd_gpfs_getacl failed with %s\n",strerror(errno))); - return NULL; - } - - return acl; -} - -static BOOL gpfs_get_nfs4_acl(struct files_struct *fsp, SMB4ACL_T **ppacl, BOOL *pretryPosix) -{ - TALLOC_CTX *mem_ctx; - int i; - struct gpfs_acl *gacl = NULL; - - mem_ctx = main_loop_talloc_get(); - - DEBUG(10, ("gpfs_get_nfs4_acl invoked for %s\n", fsp->fsp_name)); - - /* First get the real acl length */ - gacl = gpfs_getacl_alloc(fsp->fsp_name, GPFS_ACL_TYPE_NFS4); - if (gacl == NULL) { - DEBUG(9, ("gpfs_getacl failed for %s with %s\n", - fsp->fsp_name, strerror(errno))); - return False; - } - - if (gacl->acl_type != GPFS_ACL_TYPE_NFS4) { - DEBUG(10, ("Got non-nfsv4 acl\n")); - *pretryPosix = True; - return False; - } - - *ppacl = smb_create_smb4acl(); - - DEBUG(10, ("len: %d, level: %d, version: %d, nace: %d\n", - gacl->acl_len, gacl->acl_level, gacl->acl_version, - gacl->acl_nace)); - - for (i=0; i<gacl->acl_nace; i++) { - struct gpfs_ace_v4 *gace = &gacl->ace_v4[i]; - SMB_ACE4PROP_T smbace; - memset(&smbace, 0, sizeof(SMB4ACE_T)); - - DEBUG(10, ("type: %d, iflags: %x, flags: %x, mask: %x, " - "who: %d\n", gace->aceType, gace->aceIFlags, - gace->aceFlags, gace->aceMask, gace->aceWho)); - - if (gace->aceIFlags & ACE4_IFLAG_SPECIAL_ID) { - smbace.flags |= SMB_ACE4_ID_SPECIAL; - switch (gace->aceWho) { - case ACE4_SPECIAL_OWNER: - smbace.who.special_id = SMB_ACE4_WHO_OWNER; - break; - case ACE4_SPECIAL_GROUP: - smbace.who.special_id = SMB_ACE4_WHO_GROUP; - break; - case ACE4_SPECIAL_EVERYONE: - smbace.who.special_id = SMB_ACE4_WHO_EVERYONE; - break; - default: - DEBUG(8, ("invalid special gpfs id %d " - "ignored\n", gace->aceWho)); - continue; /* don't add it */ - } - } else { - if (gace->aceFlags & ACE4_FLAG_GROUP_ID) - smbace.who.gid = gace->aceWho; - else - smbace.who.uid = gace->aceWho; - } - - smbace.aceType = gace->aceType; - smbace.aceFlags = gace->aceFlags; - smbace.aceMask = gace->aceMask; - smbace.flags = (gace->aceIFlags&ACE4_IFLAG_SPECIAL_ID) ? SMB_ACE4_ID_SPECIAL : 0; - - smb_add_ace4(*ppacl, &smbace); - } - - return True; -} - -static size_t gpfsacl_get_nt_acl_common(files_struct *fsp, - uint32 security_info, SEC_DESC **ppdesc) -{ - SMB4ACL_T *pacl = NULL; - BOOL result; - BOOL retryPosix = False; - - *ppdesc = NULL; - result = gpfs_get_nfs4_acl(fsp, &pacl, &retryPosix); - if (retryPosix) - { - DEBUG(10, ("retrying with posix acl...\n")); - return get_nt_acl(fsp, security_info, ppdesc); - } - if (result==False) - return 0; - - return smb_get_nt_acl_nfs4(fsp, security_info, ppdesc, pacl); -} - -size_t gpfsacl_fget_nt_acl(vfs_handle_struct *handle, - files_struct *fsp, int fd, uint32 security_info, - SEC_DESC **ppdesc) -{ - return gpfsacl_get_nt_acl_common(fsp, security_info, ppdesc); -} - -size_t gpfsacl_get_nt_acl(vfs_handle_struct *handle, - files_struct *fsp, const char *name, - uint32 security_info, SEC_DESC **ppdesc) -{ - return gpfsacl_get_nt_acl_common(fsp, security_info, ppdesc); -} - -static BOOL gpfsacl_process_smbacl(files_struct *fsp, SMB4ACL_T *smbacl) -{ - int ret; - gpfs_aclLen_t gacl_len; - SMB4ACE_T *smbace; - struct gpfs_acl *gacl; - TALLOC_CTX *mem_ctx = main_loop_talloc_get(); - - gacl_len = sizeof(struct gpfs_acl) + - (smb_get_naces(smbacl)-1)*sizeof(gpfs_ace_v4_t); - - gacl = talloc_size(mem_ctx, gacl_len); - if (gacl == NULL) { - DEBUG(0, ("talloc failed\n")); - errno = ENOMEM; - return False; - } - - gacl->acl_len = gacl_len; - gacl->acl_level = 0; - gacl->acl_version = GPFS_ACL_VERSION_NFS4; - gacl->acl_type = GPFS_ACL_TYPE_NFS4; - gacl->acl_nace = 0; /* change later... */ - - for (smbace=smb_first_ace4(smbacl); smbace!=NULL; smbace = smb_next_ace4(smbace)) { - struct gpfs_ace_v4 *gace = &gacl->ace_v4[gacl->acl_nace]; - SMB_ACE4PROP_T *aceprop = smb_get_ace4(smbace); - - gace->aceType = aceprop->aceType; - gace->aceFlags = aceprop->aceFlags; - gace->aceMask = aceprop->aceMask; - gace->aceIFlags = (aceprop->flags&SMB_ACE4_ID_SPECIAL) ? ACE4_IFLAG_SPECIAL_ID : 0; - - if (aceprop->flags&SMB_ACE4_ID_SPECIAL) - { - switch(aceprop->who.special_id) - { - case SMB_ACE4_WHO_EVERYONE: - gace->aceWho = ACE4_SPECIAL_EVERYONE; - break; - case SMB_ACE4_WHO_OWNER: - gace->aceWho = ACE4_SPECIAL_OWNER; - break; - case SMB_ACE4_WHO_GROUP: - gace->aceWho = ACE4_SPECIAL_GROUP; - break; - default: - DEBUG(8, ("unsupported special_id %d\n", aceprop->who.special_id)); - continue; /* don't add it !!! */ - } - } else { - /* just only for the type safety... */ - if (aceprop->aceFlags&SMB_ACE4_IDENTIFIER_GROUP) - gace->aceWho = aceprop->who.gid; - else - gace->aceWho = aceprop->who.uid; - } - - gacl->acl_nace++; - } - - ret = smbd_gpfs_putacl(fsp->fsp_name, GPFS_PUTACL_STRUCT, gacl); - if (ret != 0) { - DEBUG(8, ("gpfs_putacl failed with %s\n", strerror(errno))); - gpfs_dumpacl(8, gacl); - return False; - } - - DEBUG(10, ("gpfs_putacl succeeded\n")); - return True; -} - -static BOOL gpfsacl_set_nt_acl_internal(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd) -{ - struct gpfs_acl *acl; - BOOL result = False; - - acl = gpfs_getacl_alloc(fsp->fsp_name, GPFS_ACL_TYPE_ACCESS); - if (acl == NULL) - return False; - - if (acl->acl_version&GPFS_ACL_VERSION_NFS4) - { - result = smb_set_nt_acl_nfs4( - fsp, security_info_sent, psd, - gpfsacl_process_smbacl); - } else { /* assume POSIX ACL - by default... */ - result = set_nt_acl(fsp, security_info_sent, psd); - } - - return result; -} - -static BOOL gpfsacl_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int fd, uint32 security_info_sent, SEC_DESC *psd) -{ - return gpfsacl_set_nt_acl_internal(fsp, security_info_sent, psd); -} - -static BOOL gpfsacl_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, char *name, uint32 security_info_sent, SEC_DESC *psd) -{ - return gpfsacl_set_nt_acl_internal(fsp, security_info_sent, psd); -} - -static SMB_ACL_T gpfs2smb_acl(const struct gpfs_acl *pacl) -{ - SMB_ACL_T result; - int i; - - result = sys_acl_init(pacl->acl_nace); - if (result == NULL) { - errno = ENOMEM; - return NULL; - } - - result->count = pacl->acl_nace; - - for (i=0; i<pacl->acl_nace; i++) { - struct smb_acl_entry *ace = &result->acl[i]; - const struct gpfs_ace_v1 *g_ace = &pacl->ace_v1[i]; - - DEBUG(10, ("Converting type %d id %lu perm %x\n", - (int)g_ace->ace_type, (unsigned long)g_ace->ace_who, - (int)g_ace->ace_perm)); - - switch (g_ace->ace_type) { - case GPFS_ACL_USER: - ace->a_type = SMB_ACL_USER; - ace->uid = (uid_t)g_ace->ace_who; - break; - case GPFS_ACL_USER_OBJ: - ace->a_type = SMB_ACL_USER_OBJ; - break; - case GPFS_ACL_GROUP: - ace->a_type = SMB_ACL_GROUP; - ace->gid = (gid_t)g_ace->ace_who; - break; - case GPFS_ACL_GROUP_OBJ: - ace->a_type = SMB_ACL_GROUP_OBJ; - break; - case GPFS_ACL_OTHER: - ace->a_type = SMB_ACL_OTHER; - break; - case GPFS_ACL_MASK: - ace->a_type = SMB_ACL_MASK; - break; - default: - DEBUG(10, ("Got invalid ace_type: %d\n", - g_ace->ace_type)); - errno = EINVAL; - SAFE_FREE(result); - return NULL; - } - - ace->a_perm = 0; - ace->a_perm |= (g_ace->ace_perm & ACL_PERM_READ) ? - SMB_ACL_READ : 0; - ace->a_perm |= (g_ace->ace_perm & ACL_PERM_WRITE) ? - SMB_ACL_WRITE : 0; - ace->a_perm |= (g_ace->ace_perm & ACL_PERM_EXECUTE) ? - SMB_ACL_EXECUTE : 0; - - DEBUGADD(10, ("Converted to %d perm %x\n", - ace->a_type, ace->a_perm)); - } - - return result; -} - -static SMB_ACL_T gpfsacl_get_posix_acl(const char *path, gpfs_aclType_t type) -{ - struct gpfs_acl *pacl; - SMB_ACL_T result = NULL; - - pacl = gpfs_getacl_alloc(path, type); - - if (pacl == NULL) { - DEBUG(10, ("gpfs_getacl failed for %s with %s\n", - path, strerror(errno))); - if (errno == 0) { - errno = EINVAL; - } - goto done; - } - - if (pacl->acl_version != GPFS_ACL_VERSION_POSIX) { - DEBUG(10, ("Got acl version %d, expected %d\n", - pacl->acl_version, GPFS_ACL_VERSION_POSIX)); - errno = EINVAL; - goto done; - } - - DEBUG(10, ("len: %d, level: %d, version: %d, nace: %d\n", - pacl->acl_len, pacl->acl_level, pacl->acl_version, - pacl->acl_nace)); - - result = gpfs2smb_acl(pacl); - if (result == NULL) { - goto done; - } - - done: - - if (errno != 0) { - SAFE_FREE(result); - } - return result; -} - -SMB_ACL_T gpfsacl_sys_acl_get_file(vfs_handle_struct *handle, - connection_struct *conn, - const char *path_p, - SMB_ACL_TYPE_T type) -{ - gpfs_aclType_t gpfs_type; - - switch(type) { - case SMB_ACL_TYPE_ACCESS: - gpfs_type = GPFS_ACL_TYPE_ACCESS; - break; - case SMB_ACL_TYPE_DEFAULT: - gpfs_type = GPFS_ACL_TYPE_DEFAULT; - break; - default: - DEBUG(0, ("Got invalid type: %d\n", type)); - smb_panic("exiting"); - } - - return gpfsacl_get_posix_acl(path_p, gpfs_type); -} - -SMB_ACL_T gpfsacl_sys_acl_get_fd(vfs_handle_struct *handle, - files_struct *fsp, - int fd) -{ - return gpfsacl_get_posix_acl(fsp->fsp_name, GPFS_ACL_TYPE_ACCESS); -} - -static struct gpfs_acl *smb2gpfs_acl(const SMB_ACL_T pacl, - SMB_ACL_TYPE_T type) -{ - gpfs_aclLen_t len; - struct gpfs_acl *result; - int i; - union gpfs_ace_union - { - gpfs_ace_v1_t ace_v1[1]; /* when GPFS_ACL_VERSION_POSIX */ - gpfs_ace_v4_t ace_v4[1]; /* when GPFS_ACL_VERSION_NFS4 */ - }; - - DEBUG(10, ("smb2gpfs_acl: Got ACL with %d entries\n", pacl->count)); - - len = sizeof(struct gpfs_acl) - sizeof(union gpfs_ace_union) + - (pacl->count)*sizeof(gpfs_ace_v1_t); - - result = SMB_MALLOC(len); - if (result == NULL) { - errno = ENOMEM; - return result; - } - - result->acl_len = len; - result->acl_level = 0; - result->acl_version = GPFS_ACL_VERSION_POSIX; - result->acl_type = (type == SMB_ACL_TYPE_DEFAULT) ? - GPFS_ACL_TYPE_DEFAULT : GPFS_ACL_TYPE_ACCESS; - result->acl_nace = pacl->count; - - for (i=0; i<pacl->count; i++) { - const struct smb_acl_entry *ace = &pacl->acl[i]; - struct gpfs_ace_v1 *g_ace = &result->ace_v1[i]; - - DEBUG(10, ("Converting type %d perm %x\n", - (int)ace->a_type, (int)ace->a_perm)); - - g_ace->ace_perm = 0; - - switch(ace->a_type) { - case SMB_ACL_USER: - g_ace->ace_type = GPFS_ACL_USER; - g_ace->ace_who = (gpfs_uid_t)ace->uid; - break; - case SMB_ACL_USER_OBJ: - g_ace->ace_type = GPFS_ACL_USER_OBJ; - g_ace->ace_perm |= ACL_PERM_CONTROL; - g_ace->ace_who = 0; - break; - case SMB_ACL_GROUP: - g_ace->ace_type = GPFS_ACL_GROUP; - g_ace->ace_who = (gpfs_uid_t)ace->gid; - break; - case SMB_ACL_GROUP_OBJ: - g_ace->ace_type = GPFS_ACL_GROUP_OBJ; - g_ace->ace_who = 0; - break; - case SMB_ACL_MASK: - g_ace->ace_type = GPFS_ACL_MASK; - g_ace->ace_perm = 0x8f; - g_ace->ace_who = 0; - break; - case SMB_ACL_OTHER: - g_ace->ace_type = GPFS_ACL_OTHER; - g_ace->ace_who = 0; - break; - default: - DEBUG(10, ("Got invalid ace_type: %d\n", ace->a_type)); - errno = EINVAL; - SAFE_FREE(result); - return NULL; - } - - g_ace->ace_perm |= (ace->a_perm & SMB_ACL_READ) ? - ACL_PERM_READ : 0; - g_ace->ace_perm |= (ace->a_perm & SMB_ACL_WRITE) ? - ACL_PERM_WRITE : 0; - g_ace->ace_perm |= (ace->a_perm & SMB_ACL_EXECUTE) ? - ACL_PERM_EXECUTE : 0; - - DEBUGADD(10, ("Converted to %d id %d perm %x\n", - g_ace->ace_type, g_ace->ace_who, g_ace->ace_perm)); - } - - return result; -} - -int gpfsacl_sys_acl_set_file(vfs_handle_struct *handle, - connection_struct *conn, - const char *name, - SMB_ACL_TYPE_T type, - SMB_ACL_T theacl) -{ - struct gpfs_acl *gpfs_acl; - int result; - - gpfs_acl = smb2gpfs_acl(theacl, type); - if (gpfs_acl == NULL) { - return -1; - } - - result = smbd_gpfs_putacl((char *)name, GPFS_PUTACL_STRUCT, gpfs_acl); - - SAFE_FREE(gpfs_acl); - return result; -} - -int gpfsacl_sys_acl_set_fd(vfs_handle_struct *handle, - files_struct *fsp, - int fd, SMB_ACL_T theacl) -{ - errno = ENOTSUP; - return -1; -} - -int gpfsacl_sys_acl_delete_def_file(vfs_handle_struct *handle, - connection_struct *conn, - const char *path) -{ - errno = ENOTSUP; - return -1; -} - -/* VFS operations structure */ - -static vfs_op_tuple gpfsacl_ops[] = -{ - {SMB_VFS_OP(gpfsacl_fget_nt_acl), - SMB_VFS_OP_FGET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_get_nt_acl), - SMB_VFS_OP_GET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_fset_nt_acl), - SMB_VFS_OP_FSET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_set_nt_acl), - SMB_VFS_OP_SET_NT_ACL, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_sys_acl_get_file), - SMB_VFS_OP_SYS_ACL_GET_FILE, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_sys_acl_get_fd), - SMB_VFS_OP_SYS_ACL_GET_FD, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_sys_acl_set_file), - SMB_VFS_OP_SYS_ACL_SET_FILE, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_sys_acl_set_fd), - SMB_VFS_OP_SYS_ACL_SET_FD, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(gpfsacl_sys_acl_delete_def_file), - SMB_VFS_OP_SYS_ACL_DELETE_DEF_FILE, - SMB_VFS_LAYER_TRANSPARENT}, - - {SMB_VFS_OP(NULL), - SMB_VFS_OP_NOOP, - SMB_VFS_LAYER_NOOP} -}; - -NTSTATUS vfs_gpfsacl_init(void) -{ - return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "gpfsacl", - gpfsacl_ops); -} diff --git a/source3/smbd/posix_acls.c b/source3/smbd/posix_acls.c index a1903ef4bb..a431f6e07a 100644 --- a/source3/smbd/posix_acls.c +++ b/source3/smbd/posix_acls.c @@ -901,7 +901,7 @@ static mode_t map_nt_perms( SEC_ACCESS sec_access, int type) Unpack a SEC_DESC into a UNIX owner and group. ****************************************************************************/ -BOOL unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, SEC_DESC *psd) +static BOOL unpack_nt_owners(int snum, SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, SEC_DESC *psd) { DOM_SID owner_sid; DOM_SID grp_sid; @@ -2989,7 +2989,7 @@ size_t get_nt_acl(files_struct *fsp, uint32 security_info, SEC_DESC **ppdesc) then allow chown to the currently authenticated user. ****************************************************************************/ -int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_t gid) +static int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_t gid) { int ret; files_struct *fsp; @@ -3105,7 +3105,7 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd) * Unpack the user/group/world id's. */ - if (!unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd)) { + if (!unpack_nt_owners( SNUM(conn), &sbuf, &user, &grp, security_info_sent, psd)) { return False; } |